Details of the Researcher

PHOTO

Hiroki Shizuya
Section
Institute for Excellence in Higher Education
Job title
President-Appointed Extraordinary Professor
Degree
  • 工学博士(東北大学)

Research History 5

  • 2023/04 - Present
    Tohoku University President-appointed Extraordinary Professor

  • 2015/12 - 2023/03
    Tohoku University Special Advisor to the President (for Higher Education Reform and Planning)

  • 1995/04 - 2023/03
    Tohoku University Professor

  • 1992/04 - 1995/03
    Tohoku University Associate Professor

  • 1987/04 - 1992/03
    Tohoku University Assistant Professor

Education 2

  • Tohoku University Graduate School of Engineering

    1982/04 - 1987/03

  • Tohoku University Faculty of Engineering

    1977/04 - 1981/03

Committee Memberships 3

  • IEICE Technical Committee on Information Security, Advisor

    2001/05 - 2013/05

  • CRYPTREC - Cryptography Research and Evaluation Committees Public Key Subcommittee, Member

    2000/04 - 2003/03

  • IEICE Technical Committee on Information Security, Chair

    2000/05 - 2001/05

Professional Memberships 2

  • IEICE

  • ACM SIGACT

Research Interests 2

  • Computational Complexity Theory

  • Cryptology

Research Areas 1

  • Informatics / Information theory / Cryptology

Awards 2

  1. Outstanding Paper Award, The 8th International Symposium on Computing and Networking

    2020/11 "Public-key Projective Arithmetic Functional Encryption"

  2. The Telecommunication Advancement Foundation Promotion Award

    1999/03 "Sharing Secret Keys along an Eulerian Circuit"

Papers 79

  1. Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sample Peer-reviewed

    Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya

    The 25th Annual International Conference on Information Security and Cryptology (ICISC 2022) , Lecture Notes in Computer Science 13849 472-490 2023

  2. On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem Peer-reviewed

    Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa

    2021 International Conference on Cryptology and Network Security (CANS2021), Lecture Notes in Computer Science 13099 253-272 2021/12

  3. Public-key Projective Arithmetic Functional Encryption Peer-reviewed

    Shingo Hasegawa, Masashi Hisai, Hiroki Shizuya

    International Journal of Networking and Computing 11 (2) 299-318 2021

  4. Computational Model of Card-Based Cryptographic Protocols and Its Applications Invited Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya

    IEICE Trans on Fundamentals E100A (1) 3-11 2017/01

    DOI: 10.1587/transfun.E100.A.3  

    ISSN: 1745-1337

  5. A formalization of card-based cryptographic protocols via abstract machine Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya

    International Journal of Information Security 13 (1) 15-23 2014/02

    DOI: 10.1007/s10207-013-0219-4  

    ISSN: 1615-5262

    eISSN: 1615-5270

  6. On the pseudo-freeness and the CDH assumption Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro

    International Journal of Information Security 8 (5) 347-355 2009/10

    DOI: 10.1007/s10207-009-0087-0  

    ISSN: 1615-5262

  7. Divertible and subliminal-free zero-knowledge proofs for languages Peer-reviewed

    Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya

    Journal of Cryptology 12 (3) 197-223 1999

    Publisher: Springer New York LLC

    DOI: 10.1007/s001459900053  

    ISSN: 0933-2790

  8. A structural comparison of the computational difficulty of breaking discrete log cryptosystems Peer-reviewed

    Kouichi Sakurai, Hiroki Shizuya

    Journal of Cryptology 11 (1) 29-43 1998

    Publisher: Springer New York

    DOI: 10.1007/s001459900033  

    ISSN: 0933-2790

  9. A language-dependent cryptographic primitive Peer-reviewed

    Toshiya Itoh, Yuji Ohta, Hiroki Shizuya

    Journal of Cryptology 10 (1) 37-49 1997

    Publisher: Springer New York

    DOI: 10.1007/s001459900018  

    ISSN: 0933-2790

  10. On a Relation between Knowledge-of-exponent Assumptions and the DLog vs. CDH Question Peer-reviewed

    Firas Kraiem, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya

    IEICE Trans on Fundamentals E104-A (1) 20-24 2021/01

  11. How to Implement a Non-uniform or Non-closed Shuffle Peer-reviewed

    Takahiro Saito, Daiki Miyahara, Yuta Abe, Takaaki Mizuki, Hiroki Shizuya

    9th International Conference on the Theory and Practice of Natural Computing (TPNC 2020), Lecture Notes in Computer Science 12494 107-118 2020

  12. On the classification of knowledge-of-exponent assumptions in cyclic groups Peer-reviewed

    Firas Kraiem, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya

    Interdisciplinary Information Sciences 25 (1) 67-74 2019

    Publisher: Graduate School of Information Sciences, Tohoku University

    DOI: 10.4036/iis.2019.r.03  

    ISSN: 1340-9050

    eISSN: 1347-6157

  13. On the Fixed Points of an Elliptic-Curve Version of Self-Power Map Peer-reviewed

    Hiroki Shizuya

    Interdisciplinary Information Sciences 24 (1) 87-90 2018

  14. A Construction of Attribute-based Aggregate Signatures Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya, Ryo Takahashi

    Proc. 2016 International Symposium on Information Theory and Its Applications 76-80 2016/10

  15. A Rigorous Security Proof for the Enhanced Version of Password-Protected Secret Sharing Scheme Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya

    Interdisciplinary Information Sciences 22 (1) 31-54 2016/02/09

    DOI: 10.4036/iis.2015.R.04  

  16. A Strengthened Security Notion for Password-Protected Secret Sharing Schemes Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya

    IEICE Trans on Fundamentals E98A (1) 203-212 2015/01

    DOI: 10.1587/transfun.E98.A.203  

    ISSN: 1745-1337

  17. Password-protected Secret-sharing Schemes without Random Oracles Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya

    Proc. 2014 International Symposium on Information Theory and Its Applications 579-583 2014/10

  18. On the Complexity of Computing Discrete Logarithms over Algebraic Tori (Journal version) Peer-reviewed

    Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya

    IEICE Trans on Information and Systems E97-D (3) 442-447 2014

    ISSN: 0302-9743

  19. The RSA Group Is Adaptive Pseudo-Free under the RSA Assumption Peer-reviewed

    Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya

    IEICE Trans on Fundamentals E97A (1) 200-214 2014/01

    DOI: 10.1587/transfun.E97.A.200  

    ISSN: 0916-8508

    eISSN: 1745-1337

  20. On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption Peer-reviewed

    Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya

    INFORMATION SECURITY AND PRIVACY, ACISP 2014, Lecture Notes in Computer Science 8544 290-305 2014

    DOI: 10.1007/978-3-319-08344-5_19  

    ISSN: 0302-9743

  21. Practical Card-Based Cryptography Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya

    FUN WITH ALGORITHMS, Lecture Notes in Computer Science 8496 313-324 2014

    DOI: 10.1007/978-3-319-07890-8_27  

    ISSN: 0302-9743

  22. On the length-decreasing self-reducibility and the many-one-like reducibilities for partial multivalued functions Peer-reviewed

    Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya

    IEICE Transactions on Information and Systems E96-D (3) 465-471 2013

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE

    DOI: 10.1587/transinf.E96.D.465  

    ISSN: 1745-1361 0916-8532

  23. Toward separating the strong adaptive pseudo-freeness from the strong RSA assumption Peer-reviewed

    Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya

    Proc. ACISP 2013, Lecture Notes in Computer Science 7959 72-87 2013

    DOI: 10.1007/978-3-642-39059-3_6  

    ISSN: 0302-9743 1611-3349

  24. NP-Complete Sets for Computing Discrete Logarithms and Integer Factorization Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya

    Interdisciplinary Information Sciences 19 (2) 129-134 2013

    DOI: 10.4036/iis.2013.129  

  25. Distributed Construction of Trust Anchor with the Hyper-Powering Signature Scheme Peer-reviewed

    Eisuke Koizumi, Marika Minagawa, Hiroki Shizuya

    Interdisciplinary Information Sciences 18 (1) 25-36 2012/11

    DOI: 10.4036/iis.2012.25  

  26. On the complexity of computing discrete logarithms over algebraic tori Peer-reviewed

    Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya

    International Conference on Cryptology and Network Security (CANS 2009), Lecture Notes in Computer Science 5888 433-442 2009

  27. Making cryptographic primitives harder Peer-reviewed

    Shingo Hasegawa, Hiroyuki Hatanaka, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya

    IEICE Trans on Fundamentals E91A (1) 330-337 2008/01

    DOI: 10.1093/ietfec/e91-a.1.330  

    ISSN: 1745-1337

  28. NPMV-complete functions that compute discrete logarithms and integer factorization Peer-reviewed

    Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya

    IEICE Trans on Fundamentals E91A (1) 342-344 2008/01

    DOI: 10.1093/ietfec/e91-a.1.342  

    ISSN: 0916-8508

    eISSN: 1745-1337

  29. Toward Separating Integer Factoring from Discrete Logarithm mod p Peer-reviewed

    Shuji ISOBE, Wataru KUMAGAI, Masahiro MAMBO, Hiroki SHIZUYA

    IEICE Trans Fundamentals E90-A (1) 48-53 2007

    DOI: 10.1093/ietfec/e90-a.1.48  

    ISSN: 0916-8508 1745-1337

  30. A Countermeasure for Protecting NTRUSign against the Transcript Attack Peer-reviewed

    Shingo HASEGAWA, Shuji ISOBE, Masahiro MAMBO, Hiroki SHIZUYA, Yuichi FUTA, Motoji OHMORI

    Interdisciplinary Information Sciences 13 (2) 181-188 2007

    DOI: 10.4036/iis.2007.181  

    ISSN: 1340-9050 1347-6157

  31. The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem Peer-reviewed

    Chisato Konoma, Masahiro Mambo, Hiroki Shizuya

    IEICE Trans on Fundamentals E88-A (1) 81-88 2005/01

    DOI: 10.1093/ietfec/E88-A.1.81  

    ISSN: 0916-8508 1745-1337

  32. On the Polynomial Time Computability of Abstract Ray-Tracing Problem Peer-reviewed

    Shuji ISOBE, Tetsuo KURIYAMA, Masahiro MAMBO, Hiroki SHIZUYA

    IEICE Trans. on Fundamentals E88-A (5) 1209-1213 2005

    DOI: 10.1093/ietfec/e88-a.5.1206  

    ISSN: 0916-8508 1745-1337

  33. Complexity analysis of the cryptographic primitive problems through square-root exponent Peer-reviewed

    Chisato Konoma, Masahiro Mambo, Hiroki Shizuya

    IEICE Trans. Fundamentals E87-A (5) 1083-1091 2004

  34. Characterization of optimal key set protocols Peer-reviewed

    T Mizuki, H Shizuya, T Nishizeki

    Discrete Applied Mathematics 131 (1) 213-236 2003/09

    DOI: 10.1016/S0166-218X(02)00426-2  

    ISSN: 0166-218X

  35. A note on the relationships among certified discrete log cryptosystems Peer-reviewed

    E Chida, T Itoh, H Shizuya

    IEICE Trans on Fundamentals E86A (5) 1198-1202 2003/05

    ISSN: 0916-8508

    eISSN: 1745-1337

  36. On the Strength of the Strong RSA Assumption Peer-reviewed

    Shintaro ITAGAKI, Masahiro MAMBO, Hiroki SHIZUYA

    IEICE Trans. Fundamentals E86-A (5) 1164-1170 2003

  37. On the Security of Girault Key Agreement Protocols against Active Attacks Peer-reviewed

    Soo-Hyun OH, Masahiro MAMBO, Hiroki SHIZUYA, Dong-Ho WON

    IEICE Trans Fundamentals E86-A (5) 1181-1189 2003

  38. A Complete Characterization of a Family of Key Exchange Protocols Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    International Journal of Information Security 1 (2) 131-142 2002/02

    DOI: 10.1007/s102070100011  

  39. Provably hard zero-way functions Peer-reviewed

    Eikoh Chida, Li Li, Hiroki Shizuya

    Interdisciplinary Information Sciences 8 (1) 57-61 2002

  40. Spending Offline Divisible Coins with Combining Capability Peer-reviewed

    Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya

    Indocrypt 2002, Lecture Notes in Computer Science 2551 339-353 2002

  41. Secure Access Ports with Authentication Using Inexpensive Switches and the Secure Shell Peer-reviewed

    Hideaki Goto, Masahiro Mambo, Hiroki Shizuya

    IEICE Trans D-I (Japanese Edition) J84-D-I (10) 1502-1505 2001

  42. A Way of Making Trapdoor One-Way Functions Trapdoor No-Way Peer-reviewed

    Eikoh CHIDA, Motoji OHMORI, Hiroki SHIZUYA

    IEICE Trans. Fundamentals E84-A (1) 151-156 2001

  43. On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks Peer-reviewed

    Seungjoo KIM, Masahiro MAMBO, Takeshi OKAMOTO, Hiroki SHIZUYA, Mitsuru TADA, Dongho WON

    IEICE Trans. Fundamentals E84-A (1) 231-238 2001

  44. Evaluation of tamper-resistant software deviating from structured programming rules Peer-reviewed

    Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe

    Information Security Workshop (ISW 2000), Lecture Notes in Computer Science 2119 145-158 2001

    Publisher: Springer Verlag

    DOI: 10.1007/3-540-47719-5_13  

    ISSN: 1611-3349 0302-9743

  45. On the complexity of constructing an elliptic curve of a given order Peer-reviewed

    M Yamamichi, M Mambo, H Shizuya

    IEICE Trans on Fundamentals E84A (1) 140-145 2001/01

    ISSN: 1745-1337

  46. On the Average Length of Secret Key Exchange Eulerian Circuits (Journal version) Peer-reviewed

    Takaaki Mizuki, Zhi-B Sui, Hiroki Shizuya, Takao Nishizeki

    IEICE Trans on Fundamentals E83A (4) 662-670 2000/04

    ISSN: 0916-8508

    eISSN: 1745-1337

  47. On the average length of secret key exchange Eulerian circuits Peer-reviewed

    Takaaki Mizuki, Zhi-Bo Sui, Hiroki Shizuya, Takao Nishizeki

    Proc. Japan-Korea Joint Workshop on Algorithms and Computation (WAAC 2000) 41-48 2000

  48. A Necessary and Sufficient Condition for a Key Set Protocol Using Random Deal of Cards to be Optimal Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    IEICE Trans A (Japanese Edition) J83-A (5) 545-553 2000

  49. Characterization of optimal key set protocols Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    Proc. IFIP TCS 2000, Lecture Notes in Computer Science 1872 273-285 2000

  50. On the Complexity of Languages Associated with Discrete Log Cryptosystems

    Takaharu Ohmi, Hiroki Shizuya, Takao Nishizeki

    IEICE Trans A (Japanese Edition) J82-A (3) 405-414 1999

  51. A Necessary and Sufficient Condition on the Numbers of Dealt Cards for Sharing Secret Key Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    IEICE Trans A (Japanese Edition) J82-A (1) 90-103 1999

  52. A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme (Journal version) Peer-reviewed

    Masahiro MAMBO, Hiroki SHIZUYA

    IEICE Trans. Fundamentals E82-A (1) 77-80 1999

  53. On the \Sigma_1^b-definability of Integer Factoring Peer-reviewed

    Mitsuru Tada, Hiroki Shizuya

    IPSJ Transactions 40 (12) 4362-4369 1999

  54. On the Difficulty of Searching for a String without Decryption Peer-reviewed

    Takako ITO, Hiroki SHIZUYA

    IEICE Trans. Fundamentals E82-A (1) 134-137 1999

  55. Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key (Extended abstract) Peer-reviewed

    T Mizuki, H Shizuya, T Nishizeki

    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, Lecture Notes in Compputer Science 1592 389-401 1999

    DOI: 10.1007/3-540-48910-X_27  

    ISSN: 0302-9743

  56. Eulerian secret key exchange Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    Computing and Combinatorics (COCOON '98), Lecture Notes in Computer Science 1449 349-360 1998/08

  57. Sharing Secret Keys along the Shortest Eulerian Circuit Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    IEICE Trans A (Japanese Edition) J81-A (4) 724-732 1998

  58. Sharing Secret Keys along an Eulerian Circuit with the Minimum Number of Cards Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    IEICE Trans A (Japanese Edition) J81-A (4) 714-723 1998

  59. Sharing Secret Keys along an Eulerian Circuit Peer-reviewed

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    IECE Trans A (Japanese edition) J81-A (4) 703-713 1998

  60. A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme Peer-reviewed

    Masahiro MAMBO, Hiroki SHIZUYA

    International Workshop on Theory and Practice in Public Key Cryptography, Lecture Notes in Computer Science 1431 258-262 1998

  61. A Progress Report on Subliminal-free Channels Peer-reviewed

    Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung

    Information Hiding, Lecture Notes in Computer Science 1174 157-168 1996

  62. On the Complexity of the Discrete Logarithm for a General Finite Group Peer-reviewed

    Tatsuaki OKAMOTO, Kouichi SAKURAI, Hiroki SHIZUYA

    IEICE Trans. Fundamentals E79-A (1) 61-65 1996

  63. On the one-way algebraic homomorphism Peer-reviewed

    E Chida, T Nishizeki, M Ohmori, H Shizuya

    IEICE Trans on Fundamentals E79A (1) 54-60 1996/01

    ISSN: 1745-1337

  64. One-Way Functions over Finite Near-Rings Peer-reviewed

    Eikoh CHIDA, Hiroki SHIZUYA, Takao NISHIZEKI

    IEICE Trans. Fundamentals E78-A (1) 4-10 1995

  65. Relationships among the computational powers of breaking discrete log cryptosystems Peer-reviewed

    Kouichi Sakurai, Hiroki Shizuya

    Advances in Cryptology, Proc. Eurocrypt'91, Lecture Notes in Computer Science 921 341-355 1995

    Publisher: Springer Verlag

    DOI: 10.1007/3-540-49264-X_28  

    ISSN: 1611-3349 0302-9743

  66. Demonstrating Possession without Revealing Factors Peer-reviewed

    Hiroki SHIZUYA, Kenji KOYAMA, Toshiya ITOH

    IEICE Trans. Fundamentals E77-A (1) 39-46 1994

  67. Language Dependent Secure Bit Commitment Peer-reviewed

    Toshiya Itoh, Yuji Ohta, Hiroki Shizuya

    Advances in Cryptology, Proc. Crypto'94, Lecture Notes in Computer Science 839 188-201 1994

  68. A Note on AM Languages outside NP \cup co-NP Peer-reviewed

    H SHIZUYA, T ITOH

    IEICE Trans on Fundamentals E77A (1) 65-71 1994/01

    ISSN: 0916-8508

    eISSN: 1745-1337

  69. Statistical Test of Random Pulse Stream (RPS) Generators for Communication Immunity Test Peer-reviewed

    Hideo Suzuki, Minoru Kohata, Hiroki Shizuya, Tasuku Takagi

    IEICE Trans B-II (Japanese Edition) J76-B-II (1) 53-61 1993

  70. Any Language in IP Has a Divertible ZKIP Peer-reviewed

    Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya

    Advances in Cryptology, Proc. Asiacrypt'91, Lecture Notes in Computer Science 739 420-428 1993

  71. How intractable is the discrete logarithm for a general finite group? Peer-reviewed

    Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya

    Advances in Cryptology, Proc. Eurocrypt'92, Lecture Notes in Computer Science 658 420-428 1993

    Publisher: Springer Verlag

    DOI: 10.1007/3-540-47555-9_34  

    ISSN: 1611-3349 0302-9743

  72. On the Complexity of Hyperelliptic and Elliptic Discrete Logarithm Problem Peer-reviewed

    H SHIZUYA, T ITOH, K SAKURAI

    IEICE Trans on Fundamentals 74 (8) 2129-2135 1991/08

    ISSN: 0917-1673

  73. On the Complexity of Hyperelliptic Discrete Logarithm Problem Peer-reviewed

    Hiroki SHIZUYA, Toshiya ITOH, Kouichi SAKURAI

    Advances in Cryptology - Eurocrypt 91, Lecture Notes in Computer Science 547 337-351 1991

    ISSN: 0302-9743

  74. A Group-Theoretic Interface to Random Self-Reducibility Peer-reviewed

    Hiroki SHIZUYA, Toshiya ITOH

    Trans. of the IEICE E-73 (7) 1087-1091 1990

  75. Demonstrating Possession without Revealing Factors and Its Application Peer-reviewed

    Hiroki SHIZUYA, Kenji KOYAMA, Toshiya ITOH

    Advances in Cryptology, Proc. Auscrypt'90, Lecture Notes in Computer Science 453 273-293 1990

    ISSN: 0302-9743

  76. A Public-Key Cryptosystem Based upon Generalized Inverse Matrix over Discrete Logarithmic Domain of Finite Field Peer-reviewed

    Hiroki Shizuya, Tasuku Takagi

    IEICE Trans A (Japanese Edition) J71-A (3) 825-832 1988

  77. Fully Digital Gaussian Signal Source Peer-reviewed

    Hideaki Sone, Hiroki Shizuya, Tasuku Takagi

    IEICE Trans C (Japanese Edition) J70-C (7) 1101-1102 1987

  78. An argumental expression of correlation function between arbitrary codewords Peer-reviewed

    Hiroki Shizuya, Hideaki Sone, Hiroshi Echigo, Tasuku Takagi

    Trans of the IECE E69 (12) 1294-1302 1986/12

  79. Digital Gaussian Noise Generator with Multiplex M-Sequences Peer-reviewed

    Hiroki Shizuya, Hideaki Sone, Hiroshi Echigo, Tasuku Takagi

    IECE Trans (Japanese edition) J66-C (11) 882-883 1983

Show all ︎Show first 5

Misc. 9

  1. Supersingular Isogeny-based Cryptography: A Survey Peer-reviewed

    Philipp Stratil, Shingo Hasegawa, Hiroki Shizuya

    Interdisciplinary Information Sciences 27 (1) 1-23 2021

  2. Digital Money -- A Survey Peer-reviewed

    Eikoh Chida, Masahiro Mambo, Hiroki Shizuya

    Interdisciplinary Information Sciences 7 (2) 135-165 2001

  3. Algorithms for Factorization and Discrete Logarithm Problem Invited Peer-reviewed

    Kenji Koyama, Hiroki Shizuya

    Journal of Information Processing Society of Japan 34 (2) 157-169 1993

  4. Zero-Knowledge Proofs and Complexity Theory Invited Peer-reviewed

    Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai

    Journal of Information Processing Society of Japan 32 (6) 673-681 1991

  5. A contour of information security education (in Japanese) Peer-reviewed

    Hiroki Shizuya

    Review on the literacy for information technology, new education and knowledge society (1) 72-83 2012

  6. Sharing Secret Keys along an Eulerian Circuit

    Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki

    1997 Symposium on Cryptography and Information Security (SCIS'97), SCIS97-21C ["SCIS Best Paper Award" paper. Award recipient: Takaaki Mizuki] 1997

  7. Book Review: "Science of Information Security - An Introduction to Magic Protocols" (in Japanese) by Kazuo Ohta, Kaoru Kurosawa and Osamu Watanabe, Kodansha Blue Backs B-1055, (1995). Invited

    Hiroki Shizuya

    Journal of the IEICE 78 (7) 726 1995/07

  8. Opaque/Transparent Bit Commitment Functions and their Applications

    Toshiya Itoh, Yuji Ohta, Hiroki Shizuya

    1994 Symposium on Cryptography and Information Security (SCIS'94), SCIS94-12C ["SCIS Best Paper Award" paper. Award recipient: Yuji Ohta] 1994

  9. One-Way Functions over Finite Near-Rings

    Eikoh Chida, HIroki Shizuya, Takao Nishizeki

    1994 Symposium on Cryptography and Information Security (SCIS'94), SCIS94-9B ["SCIS Best Paper Award" paper. Award recipient: Eikoh Chida] 1994

Show all ︎Show first 5

Books and Other Publications 8

  1. Breaking new paths for academic research, Artes Liberales et Universitas, vol.8 (in Japanese)

    Institute of Liberal Arts and Sciences, Tohoku University (Ed)

    Tohoku University Press 2025/03

    ISBN: 9784861634062

  2. Rings of Reading 2024 -- Guide to Research and Lecture (in Japanese)

    Institute of Liberal Arts and Sciences, Tohoku University

    Institute of Liberal Arts and Sciences, Tohoku University 2024/03

  3. Practice in Computational Thinking (in Japanese)

    Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya, Yoshinori Hayakawa

    KYORITSU SHUPPAN 2023/04

    ISBN: 9784320125209

  4. Information Ethics - Case Studies (in Japanese)

    Hiroki Shizuya

    Saiensu-sha 2008

  5. Information Security Handbook (in Japanese)

    IEICE (Ed)

    Ohmsha 2004

  6. IEICE Transactions on Fundamentals, Special Section on Cryptography and Information Security (vol.E84-A, no.1)

    Hiroki Shizuya (Guest Editor)

    IEICE 2001/01

  7. Cryptography and Aiuthentication (in Japanese)

    Society of Information Theory and Its Applications (Ed)

    Baifukan 1996

  8. Cryptography, Zero Knowledge Proof, Number Theory (in Japanese)

    Tatsuaki Okamoto, Kazuo Ohta (Eds)

    Kyoritsu Shuppan 1995

Show all Show first 5

Industrial Property Rights 18

  1. Tampering monitoring system, management device, protection control module, and detection module

    Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Shuji Isobe, Atsushi Umeta

    Property Type: Patent

  2. Manipulation monitoring system, management device and manipulation management method

    Yuichi Futa, Yuji Unagami, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa

    Property Type: Patent

  3. Tampering monitoring system, control device, and tampering control method

    Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi

    Property Type: Patent

  4. Software updating apparatus, software updating system, alteration verification method and alteration verification program

    Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Shingo Hasegawa, Marika Minagawa, Masao Sakai, Shuji Isobe, Eisuke Koizumi

    Property Type: Patent

  5. Software updating apparatus, software updating system, invalidation method, and invalidation

    Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Marika Minagawa

    Property Type: Patent

  6. Signature generation apparatus, signature verification apparatus, method thereof, and integrated circuit

    Yuichi Futa, Shingo Hasagawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya

    Property Type: Patent

  7. Tamper monitoring system, protection control module and detection module

    Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Eisuke Koizumi, Shingo Hasegawa

    Property Type: Patent

  8. Tampering monitoring system, management apparatus, and management method

    Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa

    Property Type: Patent

  9. Illegal module identifying device, information processing device, illegal module identifying method, illegal module identifying program, integrated circuit, illegal module disabling system, and illegal module disabling method

    Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi

    Property Type: Patent

  10. Information processing device, management device, illegal module detection system, illegal module detection method, recording medium on which illegal module detection program is recorded, management method, recording medium and integrated circuit on which management method is recorded

    Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Junya Iwazaki

    Property Type: Patent

  11. Software update system, management apparatus, recording medium, and integrated circuit

    Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa

    Property Type: Patent

  12. Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit

    Manabu Maeda, Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa

    Property Type: Patent

  13. Signature and verification method, signature generation device, and signature verification device

    Yuichi Futa, Hiroki Shizuya, Shuji Isobe, Shingo Hasegawa

    Property Type: Patent

  14. Shared information distributing device, holding device, certificate authority device, and system

    Manabu Maeda, Masao Nonaka, Yuichi Futa, Kaoru Yokota, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Masaki Yoshida

    Property Type: Patent

  15. Communication device and communication system

    Yuichi Futa, Motoji Ohmori, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya

    Property Type: Patent

  16. Signature generation device, key generation device, and signature generation method

    Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya

    Property Type: Patent

  17. Signature generation device and signature verification device

    Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya

    Property Type: Patent

  18. Signature generation device, and signature verification device

    Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya

    Property Type: Patent

Show all Show first 5